Entry Cheng:2013:DVB from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Cheng:2013:DVB,
author = "Yueqiang Cheng and Xuhua Ding and Robert H. Deng",
title = "{DriverGuard}: Virtualization-Based Fine-Grained
Protection on {I/O} Flows",
journal = j-TISSEC,
volume = "16",
number = "2",
pages = "6:1--6:??",
month = sep,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2505123",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Sep 23 17:04:07 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "Most commodity peripheral devices and their drivers
are geared to achieve high performance with security
functions being opted out. The absence of strong
security measures invites attacks on the I/O data and
consequently posts threats to those services feeding on
them, such as fingerprint-based biometric
authentication. In this article, we present a generic
solution called DriverGuard, which dynamically protects
the secrecy of I/O flows such that the I/O data are not
exposed to the malicious kernel. Our design leverages a
composite of cryptographic and virtualization
techniques to achieve fine-grained protection without
using any extra devices and modifications on user
applications. We implement the DriverGuard prototype on
Xen by adding around 1.7K SLOC. DriverGuard is
lightweight as it only needs to protect around 2\% of
the driver code's execution. We measure the performance
and evaluate the security of DriverGuard with three
input devices (keyboard, fingerprint reader and camera)
and three output devices (printer, graphic card, and
sound card). The experiment results show that
DriverGuard induces negligible overhead to the
applications.",
acknowledgement = ack-nhfb,
articleno = "6",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- absence,
11(3)16,
12(1)5,
12(4)20,
15(1)4,
17(2)8
- achieve,
9(2)181,
11(2)4,
11(4)18,
12(1)4,
12(1)6,
13(4)38,
14(1)5,
15(2)7,
17(2)6,
17(3)12,
18(4)12
- adding,
12(3)18,
12(4)22,
13(4)30
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- around,
10(4)3
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)230,
2(3)332,
2(4)354,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
14(4)29,
16(2)8,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)14,
11(3)15,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
18(1)1,
18(2)5
- biometric,
16(2)8,
16(3)11,
18(3)11
- called,
1(1)3,
1(1)66,
2(1)105,
2(2)177,
2(3)269,
10(1)4,
11(1)3,
11(3)14,
12(3)15,
13(1)10,
13(3)26,
13(3)27,
14(1)13,
14(4)28,
15(1)2,
15(2)9,
15(4)18,
17(1)2,
17(3)10,
17(4)16,
18(1)3
- card,
15(1)4,
15(2)7
- code,
5(3)238,
6(2)258,
11(4)23,
12(2)10,
12(2)11,
12(3)14,
12(3)19,
13(1)10,
13(2)17,
13(3)21,
15(1)2,
15(1)3,
15(2)10,
16(1)1,
16(2)7,
16(3)9,
18(4)12
- commodity,
12(2)11,
17(2)8
- consequently,
17(2)6
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
17(2)7,
17(3)10,
18(1)3
- Deng, Robert H.,
14(4)30
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- device,
2(3)230,
10(4)3,
10(4)4,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- dynamically,
9(4)421,
11(2)5,
11(4)18,
12(3)19,
16(2)5
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- execution,
1(1)26,
10(4)3,
12(2)10,
12(2)11,
12(3)14,
14(1)6,
14(2)15,
14(4)32,
15(1)2,
15(2)10,
15(3)13,
16(1)3,
16(2)7,
18(1)2,
18(1)4
- experiment,
10(4)1,
10(4)4,
11(2)5,
11(3)12,
11(4)22,
12(2)13,
13(3)28,
15(4)15,
16(3)10,
16(3)11,
16(4)14,
17(3)12,
17(4)15,
18(3)11
- exposed,
18(1)1
- feeding,
12(2)10
- Fine-Grained,
5(2)169
- fine-grained,
11(1)3,
12(2)12,
15(2)9,
16(4)17,
18(3)11
- fingerprint,
12(1)6,
15(2)7
- flow,
1(1)26,
1(1)93,
10(2)7,
12(1)5,
12(2)11,
13(3)26,
14(3)24,
15(1)2,
16(1)1,
18(2)8
- function,
2(3)230,
2(4)390,
9(2)181,
10(2)7,
10(4)3,
11(4)18,
11(4)22,
12(1)1,
12(3)18,
13(1)10,
13(4)33,
17(4)14,
18(1)1
- generic,
11(2)4,
13(4)33,
15(4)17,
16(4)15,
18(3)9
- Grained, Fine-,
5(2)169
- grained, fine-,
11(1)3,
12(2)12,
15(2)9,
18(3)11
- high,
1(1)3,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
12(2)11,
14(4)31,
15(2)7,
15(3)12,
16(2)8,
16(3)11,
17(1)1,
17(3)11,
17(4)16,
18(2)7,
18(4)12
- I/O,
14(1)12,
17(2)8
- implement,
2(2)177,
9(4)461,
11(1)3,
11(3)14,
11(3)16,
12(1)4,
12(2)13,
14(1)6,
14(1)10,
14(3)24,
14(4)31,
15(2)6,
16(2)8,
16(3)10,
16(4)14,
17(2)6,
17(3)10
- induce,
15(1)2
- input,
10(4)3,
10(4)4,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)15,
15(4)17,
16(1)4,
18(1)4
- kernel,
12(3)14,
13(1)10,
15(4)16,
16(2)7
- keyboard,
13(1)3,
16(2)8
- leverage,
11(1)2,
15(2)7
- lightweight,
12(4)21,
14(1)11,
14(1)12,
15(2)6,
17(3)10,
18(1)2
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- measure,
2(3)269,
2(3)295,
9(2)162,
10(4)5,
11(4)17,
12(3)17,
12(4)22,
13(3)22,
13(4)36,
15(1)2,
17(1)1,
18(1)1,
18(2)5
- modification,
9(4)461,
12(2)8,
12(3)18,
13(3)20,
13(3)25,
18(2)5
- most,
2(3)332,
9(4)391,
11(2)2,
11(3)12,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- need,
2(2)177,
2(3)230,
2(4)390,
9(4)421,
10(4)2,
10(4)3,
12(3)17,
13(3)22,
15(4)17,
15(4)18,
17(3)10,
18(2)6,
18(2)7
- negligible,
15(2)6
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- output,
10(4)3,
13(1)10,
14(1)7,
14(3)26,
14(4)30,
17(3)12
- overhead,
2(3)269,
11(2)5,
11(4)18,
11(4)23,
12(2)8,
12(3)14,
13(3)25,
14(1)5,
15(2)6,
15(2)9,
16(1)1,
16(2)7,
16(3)9,
16(3)11,
17(3)10,
17(4)15,
18(3)11,
18(4)12
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- post,
12(2)9,
17(3)12
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- protect,
2(3)332,
11(1)3,
12(3)15,
13(3)22,
13(3)28,
13(4)32,
15(4)18,
16(1)1,
17(1)4,
17(3)10,
18(1)1
- protection,
1(1)3,
1(1)26,
1(1)66,
1(1)93,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)295,
2(4)354,
2(4)390,
10(1)3,
10(3)9,
11(4)20,
12(2)9,
12(2)11,
13(3)22,
14(3)24,
15(1)2,
15(2)8
- prototype,
1(1)3,
2(1)34,
10(1)4,
10(4)4,
11(1)2,
11(1)3,
11(4)18,
12(1)4,
12(2)13,
13(4)30,
14(1)3,
16(1)1,
17(2)5
- reader,
12(4)21
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- secrecy,
12(1)5,
13(4)29,
17(2)7
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- solution,
9(2)162,
10(4)1,
11(1)2,
11(1)4,
11(4)20,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
13(3)22,
13(3)25,
13(3)27,
13(3)28,
15(2)7,
16(3)11,
17(1)4,
17(3)9,
17(3)10,
17(3)11,
18(1)1,
18(1)3
- sound,
10(2)6,
10(4)2,
13(3)20,
15(4)18
- strong,
2(3)230,
2(4)390,
3(3)161,
10(3)11,
11(3)13,
12(4)21,
13(1)7,
13(4)39,
15(1)3,
15(1)4,
16(3)12,
18(1)1,
18(4)13
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- three,
2(1)105,
2(3)332,
9(2)181,
12(2)10,
13(3)25,
13(4)31,
16(2)8,
16(4)16,
17(2)8,
17(4)13,
18(3)11,
18(4)12
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- Xen,
17(2)8